DOD Cyber Awareness Challenge 2025
Knowledge check Questions and Correct
Answers
Which of the following is true of compressed URLs (e.g., TinyURL,
goo.gl)? Ans: — They may be used to mask malicious intent
What is a best practice for creating user accounts for your home
computer? Ans: — Create separate accounts for each user and
have each user create their own password.
Which of the following is a best practice to protect your identity?
Ans: — Ask how information will be used before giving it out.
(Correct)
Ref: Cyber Awareness Challenge 2025 / Identity Protection
John receives an e-mail about a potential shutdown of a major
social service unless a petition receives enough signatures. Which
of the following actions should John NOT take with the e-mail?
Ans: — Forward it (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is an appropriate use of government e-
mail? Ans: — Using a digital signature when sending hyperlinks
Steve occasionally runs errands during virtual meetings. He joins
the meetings using his approved government device. Does this
pose a security concern? Ans: — Yes. Eavesdroppers may be
listening to Steve's conversation
© 2025 All rights reserved
, 2 | Page
How can you prevent viruses and malicious code? Ans: — Scan all
e-mail attachments (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting Against
Malicious Code
Matt is a government employee who needs to share a document
containing source selection data with his supervisor. Which of the
following describes the most appropriate way for Matt to do this?
Ans: — Encrypt it and send it via digitally signed Government e-
mail. (Correct)
Ref: Cyber Awareness Challenge 2025 / Protecting PII/PHI
You receive an e-mail with a link to run an anti-virus scan. Your IT
department has not sent links like this in the past. The e-mail is
not digitally signed. What action should you take? Ans: — Report
the e-mail to your security POC or help desk. (Correct)
Ref: Cyber Awareness Challenge 2025 / Phishing
Which of the following is a way to protect classified data? Ans: —
Store it in a GSA-approved container
How can you protect yourself from identity theft? Ans: — Review
your credit report annually
How can you protect your home computer? Ans: — Use legitimate,
known antivirus software (Correct)
Install spyware protection software. (Correct)
© 2025 All rights reserved